CAN/CSA-ISO/IEC 27041:18 (R2023)
Information technology — Security techniques — Guidance on assuring suitability and adequacy of incident investigative method (Adopted ISO/IEC 27041:2015, first edition, 2015-06-15)
Product Details
CSA Preface
Standards development within the Information Technology sector is harmonized with international standards development. Through the CSA Technical Committee on Information Technology (TCIT), Canadians serve as the SCC Mirror Committee (SMC) on ISO/IEC Joint Technical Committee 1 on Information Technology (ISO/IEC JTC1) for the Standards Council of Canada (SCC), the ISO member body for Canada and sponsor of the Canadian National Committee of the IEC. Also, as a member of the International Telecommunication Union (ITU), Canada participates in the International Telegraph and Telephone Consultative Committee (ITU-T).
For brevity, this Standard will be referred to as “CAN/CSA-ISO/IEC 27041” throughout.
This Standard was reviewed by the CSA TCIT under the jurisdiction of the CSA Strategic Steering Committee on Information and Communications Technology and deemed acceptable for use in Canada. From time to time, ISO/IEC may publish addenda, corrigenda, etc. The TCIT will review these documents for approval and publication. For a listing, refer to the Current Standards Activities page at standardsactivities.csagroup.org. This Standard has been formally approved, without modification, by the Technical Committee and has been developed in compliance with Standards Council of Canada requirements for National Standards of Canada. It has been published as a National Standard of Canada by CSA Group.
Scope
This International Standard provides guidance on mechanisms for ensuring that methods and processes used in the investigation of information security incidents are fit for purpose. It encapsulates best practice on defining requirements, describing methods, and providing evidence that implementations of methods can be shown to satisfy requirements. It includes consideration of how vendor and third-party testing can be used to assist this assurance process.
This document aims to
— provide guidance on the capture and analysis of functional and non-functional requirements relating to an Information Security (IS) incident investigation
— give guidance on the use of validation as a means of assuring suitability of processes involved in the investigation
— provide guidance on assessing the levels of validation required and the evidence required from a validation exercise
— give guidance on how external testing and documentation can be incorporated in the validation process.